Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
LSTM
biblio
A Black Box Modeling Technique for Distortion Stomp Boxes Using LSTM Neural Networks
Submitted by aekwall on Tue, 03/09/2021 - 12:03pm
correlation coefficient
stomp box
sound effect
Nonlinear distortion
LSTM neural networks
distortion stomp box
distortion sound
commercial stomp boxes
black box modeling
nonlinear systems
Integrated circuit modeling
LSTM
learning (artificial intelligence)
recurrent neural nets
black box encryption
neural network
Training
Neural networks
Metrics
composability
pubcrawl
Resiliency
machine learning
biblio
Fooling A Deep-Learning Based Gait Behavioral Biometric System
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
Metrics
FGSM
FGSM iterations
gait behavioral biometrics
gradient methods
LSTM
machine learning algorithms
machine learning model
mature techniques
fast gradient sign method
privacy
pubcrawl
resilience
Resiliency
shadow model
Training
user behavioral information
white-box attacks
black-box attack
white box
security
adversarial learning attacks
Adversarial Machine Learning
authentication
authorisation
Biological system modeling
biometrics (access control)
White Box Security
Classification algorithms
composability
counter spoofing threats
deep learning (artificial intelligence)
Deep-learning
deep-learning based gait behavioral biometric system
end-user devices
extent FGSM
biblio
RNN-based Prediction for Network Intrusion Detection
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
prediction model
sliding window
scoring function
RNN-based prediction
LSTM model
industrial IoT environments
data mining regression techniques
cosine similarity
anomaly detection methods
RNN
N-gram
LSTM
IDS
Euclidean distance
network intrusion detection
Internet of Things
regression analysis
composability
production engineering computing
recurrent neural nets
Data models
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
Data mining
Anomaly Detection
Predictive models
security of data
biblio
XSS Detection Technology Based on LSTM-Attention
Submitted by grigby1 on Wed, 02/10/2021 - 1:21pm
LSTM-attention detection model
XSS attacks
abstract features
added attention mechanism
attention mechanism
context-related features
Cross-site scripting (XSS)
inadequate feature extraction
long short-term memory recurrent neural network
cross-site scripting
malicious attack codes
traditional XSS detection methods
Word2Vec
XSS codes
XSS detection model
XSS detection technology
XSS payload features
Cross Site Scripting
Scalability
learning (artificial intelligence)
security of data
feature extraction
pubcrawl
Human behavior
resilience
Resiliency
robots
deep learning
Data models
internet
recurrent neural nets
pattern classification
Recurrent neural networks
Context modeling
LSTM
biblio
DeepMal: A CNN-LSTM Model for Malware Detection Based on Dynamic Semantic Behaviours
Submitted by aekwall on Mon, 02/08/2021 - 1:41pm
cyber-criminals
recurrent neural nets
Human Factors
LSTM
Compositionality
high-level abstractions
CNN-LSTM model
Cyber Dependencies
component-CNN
convolution
deep learning framework
DeepMal
dynamic semantic behaviours
evil intentions
locally spatial correlations
malicious programs
malware classification task
sequential longterm dependency
Metrics
malware
malware detection
invasive software
Data models
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
Scalability
Neurons
pattern classification
Training
machine learning
convolutional neural nets
natural language processing
NLP techniques
biblio
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters
Submitted by grigby1 on Fri, 01/22/2021 - 2:38pm
DeCrypto Pro
LSTM
defense mechanisms
advanced persistent threats
antivirus applications
APTs
behavior profiling
benign compression
classification model
collaborative attacks
computational resources
cryptographic operations
cryptojacking
cryptomining
Long short-term memory
DeCrypto Profiler framework
deep cryptomining profiler
mission-critical cybersystems
model selection
operating context profiling system
performance counters
Ransomware
system features
system functionalities
Trojan Laziok
utility function
Windows performance counters
cyberattacks
Predictive models
machine learning
Data mining
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Data models
Computational modeling
random forests
recurrent neural nets
Cryptography
deep learning
pattern classification
malware
invasive software
malware detection
nearest neighbour methods
k-nearest neighbors
Random Forest
advanced persistent threat
APT
deep neural networks
encoding
biblio
ScriptNet: Neural Static Analysis for Malicious JavaScript Detection
Submitted by aekwall on Mon, 11/30/2020 - 12:03pm
LSTM
Internet-scale Computing Security
sequential processing layers
ScriptNet system
Privacy-invasive software
preinformant learning
PIL model
neural static analysis
Neural models
neural malicious JavaScript detection
JavaScript files
Internet-scale processing
discriminative training
computer infection threat vector
policy governance
deep learning model
malware
deep learning
program diagnostics
Java
Vectors
machine learning
Neural networks
neural nets
Metrics
malware detection
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
biblio
Synthesizing Energy Consumption Data Using a Mixture Density Network Integrated with Long Short Term Memory
Submitted by grigby1 on Fri, 11/20/2020 - 2:06pm
residential consumer energy consumption
mixture density network
multiple critical infrastructures
policy-based governance
power engineering computing
Power Grid
Predictive models
privacy
privacy concerns
Probability density function
pubcrawl
Metrics
residential smart meters
resilience
Resiliency
Scalability
security
smart cities
smart grid consumer privacy
smart meters
smart power grids
standards
energy consumption
collaboration
commercial consumer energy consumption
Communication networks
composability
data analysis
data dissemination
Data models
data privacy
data storage
data synthesis
centralized data analytics
fully synthetic energy consumption data
Human behavior
human behavioral impacts
information dissemination
load patterns
Logic gates
long short-term memory network
LSTM
MDN
biblio
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection
Submitted by aekwall on Mon, 08/17/2020 - 11:18am
hybrid deep neural network design
graph Laplacian matrix
attack graphs
dimensionality reduction
graph characterization vectors
graph kernel matrices
graph signal processing
graph similarity measures
graph structures
high-dimensional intrinsic representation
high-dimensional representations
hybrid deep learning models
Matrix converters
kernel-based similarity embedding vector
long-term information learning
long-term network attack detection
network communication data
real-world network attack datasets
spatial-temporal deep learning
spatiotemporal deep learning
structural similarity information
supervised classification task
temporal communication graph
traffic analysis methods
CNN
IP networks
telecommunication traffic
Kernel
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
composability
graph theory
matrix algebra
pattern classification
computer network security
convolutional neural nets
convolutional neural network
network traffic
deep learning
signal processing
LSTM
Predictive Metrics
Laplace equations
Long short-term memory
Graph Kernel
network flows
biblio
Assertion Detection in Clinical Natural Language Processing: A Knowledge-Poor Machine Learning Approach
Submitted by aekwall on Mon, 05/18/2020 - 10:54am
disease modeling
assertion modifiers
assertion status
bidirectional long short-term memory networks
clinical assertion
clinical context
clinical entities
clinical information
clinical natural language processing
clinical NLP systems
assertion detection
diseases
electronic health record
knowledge poor deep-learning system
knowledge-poor machine learning approach
Medical diagnostic imaging
Pain
patient diagnosis
word embedding
machine learning
electronic health records
Task Analysis
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
deep learning
Training
Scalability
natural language processing
Measurement
RNN
recurrent neural nets
attention mechanism
LSTM
Knowledge engineering
assertion assignment
« first
‹ previous
1
2
3
4
5
next ›
last »